Friday Five — August 27, 2021

The Friday Five is a weekly Red Hat® blog post with 5 of the week’s top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.

Quelle: CloudForms

Leapp Upgrade using Red Hat Satellite 6

 In this post, we’ll cover how to use the Leapp upgrade utility, a feature that aims to give you both stability and the ability to upgrade with minimal downtime. We’ll enable the Leapp upgrade feature on Red Hat Satellite 6 to upgrade from RHEL 7 to RHEL 8.
Quelle: CloudForms

How to update Red Hat Enterprise Linux via minor releases and Extended Update Support

Customers often tell me that they need to stay on a specific RHEL minor release in order to maintain a supported configuration for a third-party application, such as SAP for example. It’s also typically true for large, business-critical applications that don’t tolerate frequent downtime for updates.

This article explains the mechanisms available in Red Hat Enterprise Linux (RHEL) to help make this possible.
Quelle: CloudForms

Watch now: 2021 Red Hat Security Symposium on-demand

In July, Red Hat brought together a group of security experts, partners, and industry peers to discuss some of the hybrid cloud security problems organizations face and solutions to tackle those challenges. Those sessions were recorded and are now available for free on-demand viewing.
Quelle: CloudForms

Red Hat's open approach to vulnerability management

Security is at the top of mind for our customers, and understanding the language and practices around security is vital for teams delivering applications and managing infrastructure. Understanding how Red Hat reports and evaluates security vulnerabilities — as well as the tools Red Hat uses to communicate and address vulnerabilities — goes a long way towards protecting your IT environment. 
Quelle: CloudForms

From Heartbeat to Holistic Implementation — Secure Cloud Native Deployments with FIPS 140-2 and DISA STIG

Cybersecurity has become national security as parties both foreign and domestic increasingly try to hack into government information systems. It is no wonder then that U.S. federal requirements for information security have also become the gold standard for cybersecurity in financial services, telecommunications, healthcare and other regulated markets.  In cloud computing, chief among these requirements … Continued
Quelle: Mirantis